Release Notesedit

Version Compatibilityedit

You must run the version of Shield that matches the version of Elasticsearch you are running. For example, Shield 2.4.6 requires Elasticsearch 2.4.6.

Updated Role Definitionsedit

The default role definitions in the roles.yml file may need to be changed to ensure proper interoperation with other applications such as Marvel and Kibana. Any role changes are stored in roles.yml.new when you upgrade. We recommend copying the following changes to your roles.yml file.

  • [2.4.0] Added in 2.4.0. The kibana4_server role has been updated to support privileges necessary for reporting.
  • [2.3.0] Added in 2.3.0. The default roles have been updated to use the new format and use new privilege names. The previous format is now deprecated. The kibana4 role has been removed; users should create their own based on the example kibana user role.
  • [2.1.1] Added in 2.1.1. The kibana4 role now grants access to the Field Stats API.
  • [2.0.0] Added in 2.0.0. The permission on all the roles are updated to the verbose format to make it easier to enable field level and document level security. The transport_client role has been updated to work with Elasticsearch 2.0.0. The marvel_user role has been updated to work with Marvel 2.0 and a remote_marvel_agent role has been added. The kibana3 and marvel_agent roles have been removed.
  • [1.1.0] Added in 1.1.0. kibana4_server role added that defines the minimum set of permissions necessary for the Kibana 4 server.
  • [1.0.1] Added in 1.0.1. kibana4 role updated to work with new features in Kibana 4 RC1

Change Listedit

2.4.6edit

July 25, 2017

Enhancements

  • Adds support for Elasticsearch 2.4.6.

2.4.5edit

April 27, 2017

Enhancements

  • Adds support for Elasticsearch 2.4.5.

2.4.4edit

January 12, 2017

Bug Fixes

  • Execution now stops if a destructive operations check fails.

2.4.2edit

November 22, 2016

Bug Fixes

  • Users with manage or manage_security cluster privileges can now access the .security index if they have the appropriate index privileges.

Breaking Changes

  • Shield on tribe nodes now requires tribe.on_conflict to prefer one of the clusters.

2.4.1edit

September 28, 2016

Enhancements

  • Compatibility with Elasticsearch 2.4.1

2.4.0edit

August 31, 2016

Breaking Changes

  • The monitor cluster privilege now grants access to the GET /_license API

2.3.5edit

August 3, 2016

Bug Fixes

  • Fixed a license problem that was preventing tribe nodes from working with Shield.

2.3.4edit

July 7, 2016

Bug Fixes

  • The default transport profile SSL settings now override the shield.ssl.* settings properly.
  • Fixed a memory leak that occured when indices were deleted or closed.

2.3.3edit

May 18, 2016

Bug Fixes

  • Fixed the /_shield/realm/{realms}/_cache/clear REST endpoint. This endpoint is deprecated and /_shield/realm/{realms}/_clear_cache should be used going forward.

2.3.2edit

April 26, 2016

Bug Fixes

  • Date math expressions in index names are now resolved before attempting to authorize access to the indices.
  • Fixed an issue where active directory realms did not work unless the url setting was configured.
  • Enabled _cat/indices to be used when Shield is installed.

2.3.1edit

April 4, 2016

Bug Fixes

  • Fixed an issue that could prevent nodes from joining the cluster.

2.3.0edit

March 30, 2016

New Features

Enhancements

  • Added new privileges to simplify access control.
  • Renamed the esusers realm to file. The realm type esusers is now deprecated and the file type should be used instead.

Bug Fixes

  • When evaluating permissions for multiple roles that have document level security enabled for the same index, Shield perfomed an AND on the queries, which is not consistent with how role privileges work in Shield. This has been changed to an OR relationship and may affect the behavior of existing roles; please ensure you are not relying on the AND behavior of document level security queries.
  • When evaluation permissions for user that has roles with and without document level security (and/or field level security), the roles that granted unrestricted access were not being applied properly and the user’s access was still being restricted.

2.2.1edit

March 15, 2016

Bug Fixes

  • Enable document and field level security by default.
  • Fix issues with message authentication on certain JDKs that do not support cloning message authentication codes.
  • Built in realms no longer throw an exception if the Authorization header does not contain a basic authentication token.
  • Ensure each tribe client node has the same shield configuration as defined in the settings.

2.2.0edit

February 2, 2016

New Features

  • Shield plugin for Kibana: Secures user sessions and enables users to log in and out of Kibana. For information about installing the Shield plugin, see Using Kibana with Shield.

Bug Fixes

  • Update requests (including within bulk requests) are blocked when document and field level security is enabled

2.1.2edit

February 2, 2016

Enhancements

  • Adds support for Elasticssearch 2.1.2

2.1.1edit

December 17, 2015

Bug Fixes

2.1.0edit

November 24, 2015

Breaking Changes

  • Same as 2.0.1. Document and Field Level Security is now disabled by default. Set shield.dls_fls.enabled to true in elasticsearch.yml to enable it. You cannot submit _bulk update requests when document and field level security is enabled.

Enhancements

  • Adds support for Elasticsearch 2.1.0.

2.0.2edit

December 16, 2015

Bug Fixes

2.0.1edit

November 24, 2015

Breaking Changes

  • Document and Field Level Security is now disabled by default. Set shield.dls_fls.enabled to true in elasticsearch.yml to enable it. You cannot submit _bulk update requests when document and field level security is enabled.

2.0.0edit

October 28, 2015

Breaking Changes

  • All files that Shield uses must be kept in the configuration directory due to the enhanced security of Elasticsearch 2.0.
  • The network format has been changed from all previous versions of Shield and a full cluster restart is required to upgrade to Shield 2.0.

New Features

Bug Fixes

  • Auditing now captures requests from nodes using a different system key as tampered requests.
  • The index output for auditing stores the type of request when available.
  • esusers and syskeygen work when spaces are in the Elasticsearch installation path.
  • Fixed a rare issue where authentication fails even when the username and password are correct.

1.3.3edit

November 24, 2015

Bug Fixes

  • Fixed a rare issue where authentication fails even when the username and password are correct.
  • The index output for auditing stores the type of request when available.

Enhancements

  • Tampered requests with a bad header are now audited.

1.3.2edit

August 10, 2015

Bug Fixes

  • When using the LDAP user search mechanism, connection errors during startup no longer cause the node to stop.
  • The Clear Cache API no longer generates invalid JSON.
  • The index output for auditing starts properly when forwarding the audit events to a remote cluster and uses the correct user to index the audit events.

1.3.1edit

July 21, 2015

Bug Fixes

1.3.0edit

June 24, 2015

Breaking Changes

  • The sha2 and apr1 hashing algorithms have been removed as options for the cache.hash_algo setting. If your existing Shield installation uses either of these options, remove the setting and use the default ssha256 algorithm.
  • The users file now only supports bcrypt password hashing. All existing passwords stored using the esusers tool have been hashed with bcrypt and are not affected.

New Features

  • PKI Realm: Adds Public Key Infrastructure (PKI) authentication through the use of X.509 certificates in place of username and password credentials.
  • Index Output for Audit Events: An index based output has been added for storing audit events in an Elasticsearch index.

Enhancements

  • TLS 1.2 is now the default protocol.
  • Clients that do not support pre-emptive basic authentication can now support both anonymous and authenticated access by specifying the shield.authc.anonymous.authz_exception setting with a value of false.
  • Reduced logging for common SSL exceptions, such as a client closing the connection during a handshake.

Bug Fixes

  • The esusers and syskeygen tools now work correctly with environment variables in the RPM and DEB installation environment files /etc/sysconfig/elasticsearch and /etc/default/elasticsearch.
  • Default ciphers no longer include TLS_DHE_RSA_WITH_AES_128_CBC_SHA.

1.2.3edit

July 21, 2015

Bug Fixes

1.2.2edit

June 24, 2015

Bug Fixes

  • The esusers tool no longer warns about missing roles that are properly defined in the roles.yml file.
  • The period character, ., is now allowed in usernames and role names.
  • The terms filter lookup cache has been disabled to ensure all requests are properly authorized. This removes the need to manually disable the terms filter cache.
  • For LDAP client connections, only the protocols and ciphers specified in the shield.ssl.supported_protocols and shield.ssl.ciphers settings will be used.
  • The auditing mechanism now logs authentication failed events when a request contains an invalid authentication token.

1.2.1edit

April 29, 2015

Bug Fixes

1.2.0edit

March 24, 2015

Enhancements

  • Adds support for Elasticsearch 1.5

1.1.1edit

April 29, 2015

Bug Fixes

1.1.0edit

March 24, 2015

New Features

  • LDAP:

    • Add the ability to bind as a specific user for LDAP searches, which removes the need to specify user_dn_templates. This mode of operation also makes use of connection pooling for better performance. Please see ldap user search for more information.
    • User distinguished names (DNs) can now be used for role mapping.
  • Authentication:

  • IP Filtering:

Enhancements

  • Significant memory footprint reduction of internal data structures
  • Test if SSL/TLS ciphers are supported and warn if any of the specified ciphers are not supported
  • Reduce the amount of logging when a non-encrypted connection is opened and https is being used
  • Added the kibana4_server role, which is a role that contains the minimum set of permissions required for the Kibana 4 server.
  • In-memory user credential caching hash algorithm defaults now to salted SHA-256 (see Cache hash algorithms

Bug Fixes

  • Filter out sensitive settings from the settings APIs

1.0.2edit

March 24, 2015

Bug Fixes

  • Filter out sensitive settings from the settings APIs
  • Significant memory footprint reduction of internal data structures

1.0.1edit

February 13, 2015

Bug Fixes

  • Fixed dependency issues with Elasticsearch 1.4.3 and (Lucene 4.10.3 that comes with it)
  • Fixed bug in how user roles were handled. When multiple roles were defined for a user, and one of the roles only had cluster permissions, not all privileges were properly evaluated.
  • Updated kibana4 permissions to be compatible with Kibana 4 RC1
  • Ensure the mandatory base_dn settings is set in the ldap realm configuration